US20030221094A1 - Method and system for configuring a computer - Google Patents
Method and system for configuring a computer Download PDFInfo
- Publication number
- US20030221094A1 US20030221094A1 US10/417,153 US41715303A US2003221094A1 US 20030221094 A1 US20030221094 A1 US 20030221094A1 US 41715303 A US41715303 A US 41715303A US 2003221094 A1 US2003221094 A1 US 2003221094A1
- Authority
- US
- United States
- Prior art keywords
- computer
- configuration
- distribution
- network
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4416—Network booting; Remote initial program loading [RIPL]
Definitions
- the present invention relates to computers coupled in a network and more particularly to the configuration of individual computers in the network.
- Computers such as a laptop computer, desktop, workstation, server and the like comprising a UNIX® or UNIX-like operating system (i.e. a UNIX system) can provide powerful functionality and allow for almost infinite customization.
- a UNIX and UNIX like operating system includes UNIX® (a registered trademark of the Unix System Laboratories, Inc.) and its variations such as BSD UNIX developed at UC Berkeley, and FreeBSDTM (a trademark of The FreeBSD Foundation); XENIX® (a registered trademark of Microsoft Corporation); LINUX® (a registered trademark of Linus Torvalds) and its variations, for example GNUTM (trademark of the GNU Project); and AIX® (a registered trademark of IBM), among others.
- OS UNIX and UNIX like operating system
- OS includes UNIX® (a registered trademark of the Unix System Laboratories, Inc.) and its variations such as BSD UNIX developed at UC Berkeley, and FreeBSDTM (a trademark of The FreeBSD Foundation); X
- Ghosting of a server allow you to clone the initial setup of a server, but then there is no centralized way of doing updates. ghosting also suffers from the same problem of having to manually adjust settings on each machine so that they don't conflict with the settings that are received from the ghosted image. ghosting also requires a manual install of the ghosted image on each machine which can be quite time consuming.
- a method, system and computer program product for configuring a computer are provided, particularly for computers coupled to a server on a network.
- a base operating system (OS) kernel is booted for execution by the computer, the base OS defining a kennelspace.
- a configuration application is booted for execution by the computer to manage the configuration, the configuration application defining a space between the kernelspace and a userspace defined by an OS distribution to be booted by said configuration.
- the configuration application may be directed by configuration information retrieved for said computer from a memory device coupled to the computer.
- the configuration information may be stored remotely and programmed for a particular computer using, for example, a configuration utility application.
- the configuration information can direct the specific computer to obtain a particular OS distribution stored on a network device coupled to the computer.
- the OS distribution may be obtained from a network file system and, if a version is stored to a local device coupled to the computer, the network and local versions may be one- or two-way synchronized.
- the OS distribution is rooted in a different root from the configuration application and isolated from modifying attributes of kernelspace.
- An unexpected OS booted on the computer may be detected automatically and distributed to a network memory device to facilitate redistribution to one or more computers on the network.
- the computer and others on the network having compatible hardware may be provided with one of a boot disk and a network interface device comprising a boot ROM configured to initiate the configuration steps automatically.
- User configuration may be templated for convenient and automatic configuration of applications to be executed in userspace on a per user basis. User changes may be preserved. New templates may be added. Users can update their respective template files while still receiving any updates installed by the system administrator. Templates may be structured for selective merging with system administrator changes and user changes may be overridden.
- FIG. 1 schematically illustrates a computer embodying aspects of the invention
- FIG. 2 schematically illustrates in greater detail a portion of the computer of FIG. 1;
- FIG. 3 illustrates in functional block form a portion of the memory illustrated in FIG. 2;
- FIG. 4 illustrates a flow chart of operations performed to distribute an operating system installed to a portion of the memory of FIG. 2;
- FIG. 5 illustrates a flow chart of operations for a two-way synchronization of a portion of the memory of FIG. 2;
- FIG. 6 illustrates a flow chart of operations for a user login
- FIG. 7 illustrates schematically an exemplary grouping of user configuration template files.
- the following detailed description of the embodiments of the present invention does not limit the implementation of the invention to any particular computer-programming language.
- the present invention may be implemented in any computer-programming language provided that the Operating System (OS) provides the facilities that may support the requirements of the present invention.
- OS Operating System
- a preferred embodiment is implemented in the C or C++ computer-programming language (or other computer-programming languages in conjunction with C/C++). Any limitations presented would be a result of a particular type of operating system or computer-programming language and would not be a limitation of the present invention.
- FIG. 1 An embodiment of the invention, computer system 100 , is illustrated in FIG. 1.
- Computer system 100 is adapted to communicate with other computing devices (not shown) using network 110 .
- network 110 may be embodied using conventional networking technologies and may include one or more of the following: local networks, wide area networks, intranets, the Internet, and the like.
- Computing device 100 typically includes a processing system 102 that is enabled to communicate with the network 110 , various input devices 106 , and output devices 108 .
- Input devices 106 (a keyboard and a mouse are shown) may also include a scanner, an imaging system (e.g., a camera, etc.), control panel buttons, or the like.
- output devices 108 (e.g. video display as illustrated) may also include printers and the like.
- combination input/output (I/O) devices may also be in communication with processing system 102 .
- Computing device 100 is shown with an optional control panel I/O device 106 C including control buttons and a liquid crystal display. Examples of conventional I/O devices (not shown in FIG. 1) include removable recordable media (e.g., floppy disk drives, tape drives, CD-ROM drives, DVD-RW drives, USB and other memory devices, etc.), touch screen displays, and the like.
- processing system 102 includes a number of components: a central processing unit (CPU) 202 ; memory 204 ; I/O interface 206 , network interface (I/F) 208 and removable media device 216 . Communication between various components of the processing system 102 may be facilitated via a suitable communications bus 210 as required.
- CPU 202 is a processing unit, such as an Intel PentiumTM, IBM PowerPCTM, Sun Microsystems UltraSparcTM processor, or the like, suitable for the operations described herein. As will be appreciated by those of ordinary skill in the art, other embodiments of processing system 102 could use alternative CPUs and may include embodiments in which more than one CPU is employed (not shown). CPU 202 may include various support circuits to enable communication between CPU 202 and the other components of processing system 102 .
- Memory 204 includes both volatile memory 212 and persistent memory 214 for the storage of: operational instructions for execution by CPU 202 ; data registers; application and thread storage; and the like.
- Memory 204 preferably includes a combination of random access memory (RAM), read only memory (ROM), and persistent memory such as that provided by a hard disk drive or other connected memory device such as a flash ROM (e.g. Boot ROM 211 ).
- RAM random access memory
- ROM read only memory
- persistent memory such as that provided by a hard disk drive or other connected memory device such as a flash ROM (e.g. Boot ROM 211 ).
- CPU 202 is typically coupled (to I/O Devices 106 , 108 or Network 110 ) for receiving user and other commands for configuration of processing system 102 as well as for operation thereof.
- CPU 202 is coupled to memory 204 as described further with respect to FIG. 3 for containing an operating system and configuration parameters and files for the operating system as well as for applications or other programs enabled by the operating system to execute on CPU 202 .
- Network I/F 208 enables communication between other computing devices (not shown) via network 110 .
- Network I/F 208 may be embodied in one or more conventional communication devices. Examples of a conventional communication device include: an Ethernet card; a token ring card; a modem, or the like.
- Network I/F 208 may also enable the retrieval or transmission of instructions for execution by CPU 202 , from or to a remote storage media or device via network 110 .
- I/O interface 206 enables communication between processing system 102 and the various I/O devices 106 and 108 .
- I/O interface 206 may include, for example a video card for interfacing with an external display such as output device 108 . Additionally, I/O interface 206 may enable communication between processing system 102 and a removable media device.
- Removable media 216 may comprise a conventional diskette or other removable memory devices such as ZipTM drives, flash cards, CD-ROMs, static memory devices, and the like. Removable media 216 may be used to provide instructions for execution by CPUs 202 or as a removable data storage device or both.
- FIG. 3 The computer instructions/applications stored in memory 204 and executed by CPU 202 (thus adapting the operation of computer system 100 as described herein) are illustrated in functional block form in FIG. 3. As will be appreciated by those of ordinary skill in the art, the discrimination between aspects of the applications illustrated as functional blocks in FIG. 3 is somewhat arbitrary in that various operations attributed to a particular application or portion of memory 204 as described herein may, in an alternative embodiment, be subsumed by another application or portion of memory.
- the programmed instructions may be embodied on a computer-readable medium (such as a hard disk, CD, floppy disk, flash or other memory device) which may be used for transporting the programmed instructions to the memory 204 of the computer system 100 .
- a computer-readable medium such as a hard disk, CD, floppy disk, flash or other memory device
- the programmed instructions may be embedded in a computer-readable, signal-bearing medium that is uploaded to a network by a vendor or supplier of the programmed instructions and this signal-bearing medium may be downloaded to the computer system 100 from the network 110 .
- FIG. 3 illustrates memory 204 of FIG. 2 comprising a boot application 302 , a base operating system 304 , a configuration application 306 ; an OS distribution 308 comprising a UNIX or UNIX like OS, one or more user applications, 310 A, 310 B, . . . 310 i, collectively 310 and one or more user configuration templates 312 A, 312 B, . . . 312 j, collectively 312 .
- OS distribution 308 comprising a UNIX or UNIX like OS, one or more user applications, 310 A, 310 B, . . . 310 i, collectively 310 and one or more user configuration templates 312 A, 312 B, . . . 312 j, collectively 312 .
- OS distribution 308 comprises a desired version of a UNIX or UNIX-like operating system for system 102 which may be distributed for all (or a selected some) of the computers on the network 110 in accordance with the invention as described further herein.
- Kernelspace includes anything running inside the kernel, which is the core of the operating system. It is difficult to write code for the kernel and the kernel is usually restricted to handling the interaction of the components of the system with each other or components coupled thereto, for example, via network 110 .
- Userspace is the general user level of a computer. Any user program that is run is a userspace program which interacts with kernelspace through system calls (syscalls). Userspace is generally less powerful, however it is easier and safer to program under. Kernelspace is generally more powerful, however programming in userspace is easier and safer. Programs running in kernelspace can crash the system, or overwrite important files, rendering it completely inoperable.
- Interspace provides an abstracted interface for much of userspace's interaction with the kernel. Instead of userspace programs calling into the kernel directly through syscalls, these can be redirected to interspace where they may be handled differently. Interspace facilitates the setup of parts of userspace such as the network configuration while preventing actual userspace programs from changing such settings.
- processing system 102 is configured with a boot application 302 for loading a base operating system 304 providing a kernel and a few utilities as described further below and a configuration application 306 .
- Boot application 302 may be provided from boot ROM 211 .
- Base OS 304 may be stored locally, for example, in boot ROM 211 or other persistent memory 214 or be obtained from a network file system coupled to system 102 as described further below.
- configuration application supports a universal configuration file system (UniConf). Similar to a system registry or database repository used to store settings and options for the configuration of a particular computer with a selected OS, UniConf contains information and settings for all the hardware, software, users, and preferences of the system 102 . UniConf is a centralized, hierarchical, structured, configuration system that instructs processing system 102 where to find files and other information to load and how to load it.
- UniConf is a centralized, hierarchical, structured, configuration system that instructs processing system 102 where to find files and other information to load and how to load it.
- a UniConf object can represent many different things, for example a local UniConf initialization (“ini”) file or a remote UniConf server, and is accessible via an application programming interface (API).
- I UniConf initialization
- API application programming interface
- a UniConf can even be composed of a list of different “generators” such as configuration or “ini” files or remote servers that are searched in priority sequence. UniConf can also provide default information.
- UniConf is preferably represented as a tree structure with a text key matching to a text value. Each key can have sub keys and each sub key itself can have sub keys, representing a tree of unlimited depth. Importantly, UniConf allows a structured way to specify what should happen at boot time and, preferably, thereafter. UniConf may also include a notification feature so that if a change is made, for example, to a UniConf server from which processing system 102 obtains instructions, system 102 may be advised and can choose to either respond immediately or at its next boot. Response may be in accordance with a UniConf key/value received by system 102 from a UniConf server.
- a processing system 102 has a local storage such as a flash memory device and hard drive, then a copy of the UniConf tree for that system 102 may be stored locally so that if network 110 is not working or otherwise available at boot time, system 102 can still boot and use its previous setup.
- a local storage such as a flash memory device and hard drive
- configuration application operates to create the interspace between the kernelspace and userspace. Interspace is created by loading the desired OS distribution 308 typically from a remote source coupled via network 110 as described further below. OS distribution 308 is loaded in addition to base OS 304 .
- the chroot or change root command can be used to change the root reference location in the file system of system 102 to another directory for a given command.
- the chroot command is configured to shift the reference root of the target application (e.g. OS distribution 308 ) from the default root, restricting the target from being able to access or modify files or other information outside of its chroot environment.
- OS distribution 308 can be run in a chroot. Doing this from the boot of system 102 simulates a normal system boot of OS distribution 308 while having interspace remain beneath userspace for added functionality. As OS distribution 308 boots, it defines the userspace.
- the getpid( ) system call may be configured to return 1 to the inti process.
- Configuration application 306 is adapted to preload a version of the getpid( ) system call which returns 1 to any init processes and calls the actual getpid( ) syscall otherwise.
- terminals or virtual terminals are configured.
- the command for setting terminals “getty” is chrooted as well.
- Configuration application 306 running from interspace can also automatically set up (i.e. configure as desired) a local hard drive, if available. Setup is not restricted to mounting it however, as the configuration application 306 is adaptable to replace the contents of the drive by remotely synchronizing the local drive to a desired file system located on a centralized server Such as a configuration master. This feature permits one centralized copy of an OS distribution to be customized and kept updated while having it deployed on many processing systems.
- rsync for remote synchronization known to persons of ordinary skill in the art.
- rsync is a utility that copies only the differences of files that have actually changed in two compared file structures. Further, copying over a network is performed in a compressed format to reduce bandwidth and, optionally, rsync operates through a secure shell (ssh). As such, only actual changed portions of files are transferred, rather than the entirety of each file. The portions are compressed, as needed, potentially saving transfer time. Ssh encrypts the transmission providing additional security.
- Configuration application 306 can rsync the hard drive from a remote server configured for rsync service to obtain the desired OS distribution 308 prior to performing the chroot and running init and getty. Rsync may be performed as frequently as every boot of system 102 to obtain the most current OS distribution. Since rsync only copies changes, network traffic is minimized and booting performance is maintained.
- UniConf structures the rsync to indicate which files to rsync to where on the local hard drive.
- UniConf may be maintained on a remote server such as the configuration master.
- a convenient interface such as a web interface to the configuration master may be provided to an administrative user, for example, to enable the editing of UniConf information to specify which systems 102 should receive which OS distributions 308 .
- Systems 102 may be identified by their respective hostnames or other network identifier, for example.
- its configuration application 306 may direct a connection to a configuration master as a UniConf server and request a location identifier (e.g. URL) for the OS distribution 308 to mount. If no specific OS distribution 308 is specified for a given system, a default may be applied.
- configuration application 306 may be adapted to distribute a locally stored operating system (not shown) for creating a master OS for distribution to other systems.
- system 102 can be booted from a CD-ROM or local hard disk with a desired operating system installed on it. This OS, once configured may be synchronized out to create an OS distribution copy.
- the configuration application 306 may be installed and initiated. When system 102 is rebooted again, the configuration application will be initiated at boot time and identify that a new (i.e. local) operating system has been installed.
- each hard drive in a system 102 is formatted with the first partition used to store the information about what the hard disk is and what it should contain.
- this partition has a known file system, size, and expected files, it can be easily determined by a configuration application 306 if a new (i.e. unexpected) OS has been installed on the drive.
- This new OS can then be synchronized over to a configuration master server for storage and distribution out to one or more other systems 102 .
- the copied OS may be stored in association with a unique identifier such as a globally unique identifier (GUID) for identification.
- GUID globally unique identifier
- a user may also name an OS distribution for easier reference, if desired.
- FIG. 4 shows a flow chart of operations S 400 to check the integrity of a local hard drive to see if it contains a known OS or an OS to distribute. Such a disk integrity check may be performed at each boot before chrooting the init process of OS distribution 308 away from interspace.
- disk integrity operations mount the local hard drive's first partition.
- the partition is inspected to determine whether it comprises the expected files for a known OS distribution. If expected files are located, operations skip to S 422 . Otherwise, at S 406 and S 408 , mounting of the remaining partitions is attempted and noted and for those that are mountable, each partition is evaluated to find one that contains a table of file system information (e.g. /fstab or /etc/fstab) S 410 .
- a table of file system information e.g. /fstab or /etc/fstab
- file system information is parsed to determine file system structure among the partitions.
- the file system is copied via rsync in association with a newly generated GUID to the configuration master server. Operations then continue at S 418 .
- the local hard drive is reformatted and partitioned to follow configuration application standards for known OS distributions (i.e. setting up the first partition with appropriate known files and file system).
- the OS that was distributed may then be synchronized from the configuration master server back to the main file system partition (S 420 ).
- system 102 is configured with the configuration application and the desired version of the OS distribution in a form that may be initiated following a chroot and with an appropriately configured getpid( ) (S 422 ).
- FIG. 5 shows the optional operations S 500 of two way synchronization.
- files may be stored in association with a timestamp and, preferably a unique identifier based upon the contents of the file such as a message digest value determined in accordance with a message digest mechanism such as MD 5 or similar functions.
- a rule may be applied to select which file will be kept in preference to the other (S 506 ).
- One rule may prefer local users over system administrators, another the opposite and yet a third may select based upon a time of the change, with the earlier or later update prevailing. User input could also be sought.
- the change may be copied via rsync to the other (S 510 ). Otherwise, the change must be a deletion by one or the other. A synchronization of the deleted file on the other may be performed (S 512 ). Operations return from S 506 , S 510 and S 512 to S 502 to determine if more files have changed.
- Configuration application 306 can be adapted to facilitate the remote configuration of system 102 from a configuration master server to use any OS distribution that has been installed to the server facilitating quick and efficient cloning of systems 102 . At the same time, customization is still possible using the various forms of synchronization.
- each system 102 may be identified by its hostname or its Internet Protocol (IP) address on network 110 where network 110 is configured as an IP network.
- Systems 102 may be configured, for example, to automatically obtain their respective IP address from a network server providing dynamic host configuration protocol (DHCP) services for the network 110 .
- IP addresses may also be assigned statically.
- a system's IP address may be displayed on its control panel I/O device 106 C to provide convenient notification of the identifier to a user for configuring the configuration master server. With this identifier, a hostname (a convenient representation of the IP address) can be assigned in the configuration master server's web configuration interface.
- the web configuration interface on the configuration master server can then be used to, for example, identify “hostname” to the server as a system to receive an OS distribution.
- UniConf on the server will in turn send a message (UniConf key/value) to “hostname” to instruct system 102 to seek the OS distribution upon a boot of that system.
- a UniConf key/value message can also indicate that this boot should occur immediately, if desired.
- System 102 when rebooted, then reloads its UniConf tree of key/values which instructs system 102 with the location of the network drive with which the local hard drive is to rsync (or to network mount that network drive if there is no hard drive). Following these operations, system 102 becomes a network-configured system with the desired OS distribution 308 and may be initiated as previously described.
- Configuration application 306 can be loaded into system 102 by network booting.
- Base OS 304 i.e. the kernel
- the configuration application 306 may be loaded from a boot disk or a boot ROM (which may form part of a network I/F device 208 ). If the system 102 has a hard drive it may be automatically detected and used by configuration application 306 . If system 102 does not have a local hard drive, then configuration application 306 may be configured to use a network file system (NFS) identified by the base OS instead and the system 102 can still be fully functional. The identified OS distribution is then obtained by the configuration application 306 .
- NFS network file system
- configuration application 306 facilitates a templated user file system so that each individual user can have configuration files automatically generated for particular users application.
- the user applications are typically installed on network system-wide basis (i.e. are available to user systems such as system 102 from a server).
- Configuration files for each user application can be templated and stored in a template directory from which they can be automatically copied or customized and copied, as necessary, to a particular user's directory.
- a template requiring customization to identify a particular user may be run through a filter to replace user-specific parts with the correct information before being installed for the particular user.
- Template files not requiring user-specific part replacement may be simply installed into a user's home directory which may be a mount over NFS or a local drive relative to system 102 .
- FIG. 6 illustrates a flowchart of operations S 600 for a user login in accordance with the invention.
- Any user configuration template file that requires user customization is preprocessed to generate a user configuration template file 312 .
- processing may be performed using standard regular expression substitution, for example, have OS substitution editor utility “sed” replace %%%%USER%%% with the current username, etc.
- each user config template file 312 (generated by preprocessing or not) is compared with its corresponding user config template file stored in the user's personal template directory on the configuration master server. Because file comparison operations perform relatively slowly for a login, datestamps may be compared, working under the assumption that if the modification time is exactly the same it is most likely the exact same file.
- the template operations can be enhanced by keeping a copy of the installed templates locally in a user's home directory, where possible. By doing three-way differences between the user's local version, the templated version, and a previous template version stored remotely, updates may be automatically performed without removing a user's customization. The templates stored in the user's directory are then updated with the new global template version so that the merge is not done repeatedly.
- the templates do not necessarily need to be installed over a user's settings. Instead, the user can selective choose which configurations to update and/or override in order to gain any updates and to fix anything that has gone wrong. This can be accomplished by separating the template files into categories. Each template directory contains files for a certain user application grouping. For example, each application can have a separate sub directory in the overall template directory. An exemplary template directory structure is illustrated in FIG. 7.
- a template setup mechanism in configuration application 306 may comprise a simple shell script that performs a for loop for every folder and subfolder of the template directories, running each “go” script located therein. Each go script can then be customized to do any extra configuration needed as well as running the main template program which does the procedure outlined earlier on the template directory given the destination directory/name.
- the setup shell may be adapted with a parameter indicating a specific segment of the directories to setup or a flag to force an override, for example.
- system 102 can be installed and set up with minimal input from the administrator and none from the end user. However, by providing an end user with templates that may be modified and merged, user customizations may be maintained. Remote storage of OS distribution 306 and customizations (user configuration templates 312 etc.) permits a particular end user to login at any system 102 connected to the configuration master server and have the user's customizations automatically configure system 102 .
Abstract
Description
- This application claims priority from U.S. Provisional Application No. 60/372,797 filed Apr. 17, 2002.
- The present invention relates to computers coupled in a network and more particularly to the configuration of individual computers in the network.
- Computers such as a laptop computer, desktop, workstation, server and the like comprising a UNIX® or UNIX-like operating system (i.e. a UNIX system) can provide powerful functionality and allow for almost infinite customization. A UNIX and UNIX like operating system (OS) includes UNIX® (a registered trademark of the Unix System Laboratories, Inc.) and its variations such as BSD UNIX developed at UC Berkeley, and FreeBSD™ (a trademark of The FreeBSD Foundation); XENIX® (a registered trademark of Microsoft Corporation); LINUX® (a registered trademark of Linus Torvalds) and its variations, for example GNU™ (trademark of the GNU Project); and AIX® (a registered trademark of IBM), among others. However, the power and versatility of a UNIX system come at a price. A UNIX system takes significant resources to configure and to maintain.
- For an organization that requires more than one UNIX system, for example for coupling in a network configuration, the resources required for configuration and maintenance multiply. It can thus become very expensive to run a network of UNIX systems despite the relatively low cost of the operating system, simply because of the support staff required. When a new UNIX system is introduced into the network it must have UNIX installed on it and then be configured in accordance with the requirements of the network and other preferences and needs of the organization. This can often lead to inconsistencies between machines and a variety of subtle problems can arise.
- Some software packages exist that allow for installing software on one machine and then propagating it over the network to other systems. These packages, however, are not very flexible and require identical setups on each machine. They can also be difficult to set up and do not always perform as expected.
- Settings that are specific for a system can be particularly problematic with a solution like this. If one system changes a network parameter such as its hostname or Internet Protocol (IP) address and these changes are propagated over the network, all systems on that network will try to make the same changes, resulting in numerous conflicts.
- Other solutions such as ghosting of a server allow you to clone the initial setup of a server, but then there is no centralized way of doing updates. Ghosting also suffers from the same problem of having to manually adjust settings on each machine so that they don't conflict with the settings that are received from the ghosted image. Ghosting also requires a manual install of the ghosted image on each machine which can be quite time consuming.
- Therefore there is a need for a solution which addresses some or all of these shortcomings.
- In accordance with aspects of the invention a method, system and computer program product for configuring a computer are provided, particularly for computers coupled to a server on a network. A base operating system (OS) kernel is booted for execution by the computer, the base OS defining a kennelspace. A configuration application is booted for execution by the computer to manage the configuration, the configuration application defining a space between the kernelspace and a userspace defined by an OS distribution to be booted by said configuration. The configuration application may be directed by configuration information retrieved for said computer from a memory device coupled to the computer. The configuration information may be stored remotely and programmed for a particular computer using, for example, a configuration utility application. The configuration information can direct the specific computer to obtain a particular OS distribution stored on a network device coupled to the computer. The OS distribution may be obtained from a network file system and, if a version is stored to a local device coupled to the computer, the network and local versions may be one- or two-way synchronized. The OS distribution is rooted in a different root from the configuration application and isolated from modifying attributes of kernelspace. An unexpected OS booted on the computer may be detected automatically and distributed to a network memory device to facilitate redistribution to one or more computers on the network. The computer and others on the network having compatible hardware may be provided with one of a boot disk and a network interface device comprising a boot ROM configured to initiate the configuration steps automatically. User configuration may be templated for convenient and automatic configuration of applications to be executed in userspace on a per user basis. User changes may be preserved. New templates may be added. Users can update their respective template files while still receiving any updates installed by the system administrator. Templates may be structured for selective merging with system administrator changes and user changes may be overridden.
- A better understanding of these and other aspects of the present invention can be obtained with reference to the following drawings and description.
- The embodiments of the present invention will be explained by way of the following drawings, in which:
- FIG. 1 schematically illustrates a computer embodying aspects of the invention;
- FIG. 2 schematically illustrates in greater detail a portion of the computer of FIG. 1;
- FIG. 3 illustrates in functional block form a portion of the memory illustrated in FIG. 2; and
- FIG. 4 illustrates a flow chart of operations performed to distribute an operating system installed to a portion of the memory of FIG. 2;
- FIG. 5 illustrates a flow chart of operations for a two-way synchronization of a portion of the memory of FIG. 2;
- FIG. 6 illustrates a flow chart of operations for a user login; and
- FIG. 7 illustrates schematically an exemplary grouping of user configuration template files.
- Similar references are used in different figures to denote similar components.
- The following detailed description of the embodiments of the present invention does not limit the implementation of the invention to any particular computer-programming language. The present invention may be implemented in any computer-programming language provided that the Operating System (OS) provides the facilities that may support the requirements of the present invention. A preferred embodiment is implemented in the C or C++ computer-programming language (or other computer-programming languages in conjunction with C/C++). Any limitations presented would be a result of a particular type of operating system or computer-programming language and would not be a limitation of the present invention.
- An embodiment of the invention,
computer system 100, is illustrated in FIG. 1.Computer system 100 is adapted to communicate with other computing devices (not shown) usingnetwork 110. As will be appreciated by those of ordinary skill in the art,network 110 may be embodied using conventional networking technologies and may include one or more of the following: local networks, wide area networks, intranets, the Internet, and the like. - Through the description herein, an embodiment of the invention is illustrated with aspects of the invention embodied solely on
computer system 100. As will be appreciated by those of ordinary skill in the art, those aspects of the invention may be distributed among one or more networked computing devices which interact withcomputer system 100, using one or more networks such as, forexample network 110. However, for ease of understanding, aspects of the invention have been embodied in a single computing device,computer system 100. -
Computing device 100 typically includes aprocessing system 102 that is enabled to communicate with thenetwork 110, various input devices 106, andoutput devices 108. Input devices 106, (a keyboard and a mouse are shown) may also include a scanner, an imaging system (e.g., a camera, etc.), control panel buttons, or the like. Similarly, output devices 108 (e.g. video display as illustrated) may also include printers and the like. Additionally, combination input/output (I/O) devices may also be in communication withprocessing system 102.Computing device 100 is shown with an optional control panel I/O device 106C including control buttons and a liquid crystal display. Examples of conventional I/O devices (not shown in FIG. 1) include removable recordable media (e.g., floppy disk drives, tape drives, CD-ROM drives, DVD-RW drives, USB and other memory devices, etc.), touch screen displays, and the like. -
Exemplary processing system 102 is illustrated in greater detail in FIG. 2. As illustrated,processing system 102 includes a number of components: a central processing unit (CPU) 202;memory 204; I/O interface 206, network interface (I/F) 208 andremovable media device 216. Communication between various components of theprocessing system 102 may be facilitated via asuitable communications bus 210 as required. -
CPU 202 is a processing unit, such as an Intel Pentium™, IBM PowerPC™, Sun Microsystems UltraSparc™ processor, or the like, suitable for the operations described herein. As will be appreciated by those of ordinary skill in the art, other embodiments ofprocessing system 102 could use alternative CPUs and may include embodiments in which more than one CPU is employed (not shown).CPU 202 may include various support circuits to enable communication betweenCPU 202 and the other components ofprocessing system 102. -
Memory 204 includes bothvolatile memory 212 andpersistent memory 214 for the storage of: operational instructions for execution byCPU 202; data registers; application and thread storage; and the like.Memory 204 preferably includes a combination of random access memory (RAM), read only memory (ROM), and persistent memory such as that provided by a hard disk drive or other connected memory device such as a flash ROM (e.g. Boot ROM 211). -
CPU 202 is typically coupled (to I/O Devices 106, 108 or Network 110) for receiving user and other commands for configuration ofprocessing system 102 as well as for operation thereof.CPU 202 is coupled tomemory 204 as described further with respect to FIG. 3 for containing an operating system and configuration parameters and files for the operating system as well as for applications or other programs enabled by the operating system to execute onCPU 202. - Network I/
F 208 enables communication between other computing devices (not shown) vianetwork 110. Network I/F 208 may be embodied in one or more conventional communication devices. Examples of a conventional communication device include: an Ethernet card; a token ring card; a modem, or the like. Network I/F 208 may also enable the retrieval or transmission of instructions for execution byCPU 202, from or to a remote storage media or device vianetwork 110. - I/
O interface 206 enables communication betweenprocessing system 102 and the various I/O devices 106 and 108. I/O interface 206 may include, for example a video card for interfacing with an external display such asoutput device 108. Additionally, I/O interface 206 may enable communication betweenprocessing system 102 and a removable media device.Removable media 216 may comprise a conventional diskette or other removable memory devices such as Zip™ drives, flash cards, CD-ROMs, static memory devices, and the like.Removable media 216 may be used to provide instructions for execution byCPUs 202 or as a removable data storage device or both. - The computer instructions/applications stored in
memory 204 and executed by CPU 202 (thus adapting the operation ofcomputer system 100 as described herein) are illustrated in functional block form in FIG. 3. As will be appreciated by those of ordinary skill in the art, the discrimination between aspects of the applications illustrated as functional blocks in FIG. 3 is somewhat arbitrary in that various operations attributed to a particular application or portion ofmemory 204 as described herein may, in an alternative embodiment, be subsumed by another application or portion of memory. - The programmed instructions may be embodied on a computer-readable medium (such as a hard disk, CD, floppy disk, flash or other memory device) which may be used for transporting the programmed instructions to the
memory 204 of thecomputer system 100. Alternatively, the programmed instructions may be embedded in a computer-readable, signal-bearing medium that is uploaded to a network by a vendor or supplier of the programmed instructions and this signal-bearing medium may be downloaded to thecomputer system 100 from thenetwork 110. - FIG. 3 illustrates
memory 204 of FIG. 2 comprising aboot application 302, abase operating system 304, aconfiguration application 306; anOS distribution 308 comprising a UNIX or UNIX like OS, one or more user applications, 310A, 310B, . . . 310 i, collectively 310 and one or moreuser configuration templates -
OS distribution 308 comprises a desired version of a UNIX or UNIX-like operating system forsystem 102 which may be distributed for all (or a selected some) of the computers on thenetwork 110 in accordance with the invention as described further herein. - Software executing on a computer such as
processing system 102 may be generally considered as divided into two parts: kernelspace and userspace. Kernelspace includes anything running inside the kernel, which is the core of the operating system. It is difficult to write code for the kernel and the kernel is usually restricted to handling the interaction of the components of the system with each other or components coupled thereto, for example, vianetwork 110. Userspace is the general user level of a computer. Any user program that is run is a userspace program which interacts with kernelspace through system calls (syscalls). Userspace is generally less powerful, however it is easier and safer to program under. Kernelspace is generally more powerful, however programming in userspace is easier and safer. Programs running in kernelspace can crash the system, or overwrite important files, rendering it completely inoperable. - Programs that interact with a user are written for userspace. In accordance with the invention, there is provided an intermediate application for creating a notional program space between kernelspace and userspace referred to herein as an interspace. Interspace provides an abstracted interface for much of userspace's interaction with the kernel. Instead of userspace programs calling into the kernel directly through syscalls, these can be redirected to interspace where they may be handled differently. Interspace facilitates the setup of parts of userspace such as the network configuration while preventing actual userspace programs from changing such settings.
- In general, interspace can take care of the setup process for
system 102 automatically and then prevent userspace programs from changing particular setup configurations. In accordance with the invention,processing system 102 is configured with aboot application 302 for loading abase operating system 304 providing a kernel and a few utilities as described further below and aconfiguration application 306.Boot application 302 may be provided fromboot ROM 211.Base OS 304 may be stored locally, for example, inboot ROM 211 or otherpersistent memory 214 or be obtained from a network file system coupled tosystem 102 as described further below. - It is anticipated that some
particular processing systems 102 may not include a local hard drive. As such, local storage for operating system and configuration files may be limited. In accordance with the invention, configuration application supports a universal configuration file system (UniConf). Similar to a system registry or database repository used to store settings and options for the configuration of a particular computer with a selected OS, UniConf contains information and settings for all the hardware, software, users, and preferences of thesystem 102. UniConf is a centralized, hierarchical, structured, configuration system that instructsprocessing system 102 where to find files and other information to load and how to load it. A UniConf object can represent many different things, for example a local UniConf initialization (“ini”) file or a remote UniConf server, and is accessible via an application programming interface (API). A UniConf can even be composed of a list of different “generators” such as configuration or “ini” files or remote servers that are searched in priority sequence. UniConf can also provide default information. - UniConf is preferably represented as a tree structure with a text key matching to a text value. Each key can have sub keys and each sub key itself can have sub keys, representing a tree of unlimited depth. Importantly, UniConf allows a structured way to specify what should happen at boot time and, preferably, thereafter. UniConf may also include a notification feature so that if a change is made, for example, to a UniConf server from which
processing system 102 obtains instructions,system 102 may be advised and can choose to either respond immediately or at its next boot. Response may be in accordance with a UniConf key/value received bysystem 102 from a UniConf server. - If a
processing system 102 has a local storage such as a flash memory device and hard drive, then a copy of the UniConf tree for thatsystem 102 may be stored locally so that ifnetwork 110 is not working or otherwise available at boot time,system 102 can still boot and use its previous setup. - Once
base operating system 304 andconfiguration application 306 are loaded, configuration application operates to create the interspace between the kernelspace and userspace. Interspace is created by loading the desiredOS distribution 308 typically from a remote source coupled vianetwork 110 as described further below.OS distribution 308 is loaded in addition tobase OS 304. As will be understood to persons skilled in the art, the chroot or change root command can be used to change the root reference location in the file system ofsystem 102 to another directory for a given command. The chroot command is configured to shift the reference root of the target application (e.g. OS distribution 308) from the default root, restricting the target from being able to access or modify files or other information outside of its chroot environment. - By chrooting the init (startup) process of the
OS distribution 308 and convincing it that it hasprocess id 1,OS distribution 308 can be run in a chroot. Doing this from the boot ofsystem 102 simulates a normal system boot ofOS distribution 308 while having interspace remain beneath userspace for added functionality. AsOS distribution 308 boots, it defines the userspace. - For the inti process of the
OS distribution 308 to run and believe that it is the first process being run (i.e. that the system is just starting up now), the getpid( ) system call may be configured to return 1 to the inti process.Configuration application 306 is adapted to preload a version of the getpid( ) system call which returns 1 to any init processes and calls the actual getpid( ) syscall otherwise. - To facilitate one or more users on
system 102, terminals or virtual terminals (ttys) are configured. To ensure the terminals are properly rooted, the command for setting terminals “getty” is chrooted as well. By having all of the ttys on thesystem 102 listen from within the chroot, the environment below the chroot (i.e. interspace) can be completely concealed from and inaccessible to the end user. -
Configuration application 306 running from interspace can also automatically set up (i.e. configure as desired) a local hard drive, if available. Setup is not restricted to mounting it however, as theconfiguration application 306 is adaptable to replace the contents of the drive by remotely synchronizing the local drive to a desired file system located on a centralized server Such as a configuration master. This feature permits one centralized copy of an OS distribution to be customized and kept updated while having it deployed on many processing systems. - One UNIX utility that may be included in the
base OS 304 is rsync for remote synchronization known to persons of ordinary skill in the art. Rather than have a scripted FTP session, or some other form of file transfer script, rsync is a utility that copies only the differences of files that have actually changed in two compared file structures. Further, copying over a network is performed in a compressed format to reduce bandwidth and, optionally, rsync operates through a secure shell (ssh). As such, only actual changed portions of files are transferred, rather than the entirety of each file. The portions are compressed, as needed, potentially saving transfer time. Ssh encrypts the transmission providing additional security. - Normally rsync is used to update part of a hard drive, but, in accordance with the invention, because the core of the base OS is protected, the entire hard drive may be overwritten.
Configuration application 306 can rsync the hard drive from a remote server configured for rsync service to obtain the desiredOS distribution 308 prior to performing the chroot and running init and getty. Rsync may be performed as frequently as every boot ofsystem 102 to obtain the most current OS distribution. Since rsync only copies changes, network traffic is minimized and booting performance is maintained. - UniConf structures the rsync to indicate which files to rsync to where on the local hard drive. UniConf may be maintained on a remote server such as the configuration master. A convenient interface such as a web interface to the configuration master may be provided to an administrative user, for example, to enable the editing of UniConf information to specify which
systems 102 should receive whichOS distributions 308.Systems 102 may be identified by their respective hostnames or other network identifier, for example. When aparticular system 102 boots, itsconfiguration application 306 may direct a connection to a configuration master as a UniConf server and request a location identifier (e.g. URL) for theOS distribution 308 to mount. If nospecific OS distribution 308 is specified for a given system, a default may be applied. - In addition to synchronizing in an
OS distribution 308,configuration application 306 may be adapted to distribute a locally stored operating system (not shown) for creating a master OS for distribution to other systems. For example,system 102 can be booted from a CD-ROM or local hard disk with a desired operating system installed on it. This OS, once configured may be synchronized out to create an OS distribution copy. Theconfiguration application 306 may be installed and initiated. Whensystem 102 is rebooted again, the configuration application will be initiated at boot time and identify that a new (i.e. local) operating system has been installed. To detect different OSes, each hard drive in asystem 102 is formatted with the first partition used to store the information about what the hard disk is and what it should contain. Because this partition has a known file system, size, and expected files, it can be easily determined by aconfiguration application 306 if a new (i.e. unexpected) OS has been installed on the drive. This new OS can then be synchronized over to a configuration master server for storage and distribution out to one or moreother systems 102. The copied OS may be stored in association with a unique identifier such as a globally unique identifier (GUID) for identification. A user may also name an OS distribution for easier reference, if desired. - FIG. 4 shows a flow chart of operations S400 to check the integrity of a local hard drive to see if it contains a known OS or an OS to distribute. Such a disk integrity check may be performed at each boot before chrooting the init process of
OS distribution 308 away from interspace. - At S402, disk integrity operations mount the local hard drive's first partition. At S404, the partition is inspected to determine whether it comprises the expected files for a known OS distribution. If expected files are located, operations skip to S422. Otherwise, at S406 and S408, mounting of the remaining partitions is attempted and noted and for those that are mountable, each partition is evaluated to find one that contains a table of file system information (e.g. /fstab or /etc/fstab) S410.
- At S412 file system information is parsed to determine file system structure among the partitions. At S416, starting with the partition that contains/(i.e. the root), the file system is copied via rsync in association with a newly generated GUID to the configuration master server. Operations then continue at S418.
- If at S408, no fstab is found in all the partitions and if there is more than one partition with file contents then user input may be sought (S414). Contents of each partition may be copied via rsync to the configuration master server in any event (S416).
- At S418, once the files on the hard disk have been distributed, and assuming that UniConf has specified that this process should be automatic, the local hard drive is reformatted and partitioned to follow configuration application standards for known OS distributions (i.e. setting up the first partition with appropriate known files and file system). The OS that was distributed may then be synchronized from the configuration master server back to the main file system partition (S420).
- Following S420,
system 102 is configured with the configuration application and the desired version of the OS distribution in a form that may be initiated following a chroot and with an appropriately configured getpid( ) (S422). - Instead of just synchronizing the (userspace) file system from
system 102 to a remote server, or more typically from a remote server tosystem 102, two-way synchronizations may be performed so that updates are passed either way. In this way, updates are not lost. FIG. 5 shows the optional operations S500 of two way synchronization. - At S502, for each file, a determination is made whether either
system 102 or the remote server has changed a file. To facilitate a change determination, files may be stored in association with a timestamp and, preferably a unique identifier based upon the contents of the file such as a message digest value determined in accordance with a message digest mechanism such as MD5 or similar functions. At S504, if both of thesystem 102 and remote server changed the file, a rule may be applied to select which file will be kept in preference to the other (S506). One rule may prefer local users over system administrators, another the opposite and yet a third may select based upon a time of the change, with the earlier or later update prevailing. User input could also be sought. At S508, if only one changed the file, the change may be copied via rsync to the other (S510). Otherwise, the change must be a deletion by one or the other. A synchronization of the deleted file on the other may be performed (S512). Operations return from S506, S510 and S512 to S502 to determine if more files have changed. -
Configuration application 306 can be adapted to facilitate the remote configuration ofsystem 102 from a configuration master server to use any OS distribution that has been installed to the server facilitating quick and efficient cloning ofsystems 102. At the same time, customization is still possible using the various forms of synchronization. - As is known to persons skilled in the art, each
system 102 may be identified by its hostname or its Internet Protocol (IP) address onnetwork 110 wherenetwork 110 is configured as an IP network.Systems 102 may be configured, for example, to automatically obtain their respective IP address from a network server providing dynamic host configuration protocol (DHCP) services for thenetwork 110. IP addresses may also be assigned statically. A system's IP address may be displayed on its control panel I/O device 106C to provide convenient notification of the identifier to a user for configuring the configuration master server. With this identifier, a hostname (a convenient representation of the IP address) can be assigned in the configuration master server's web configuration interface. - The web configuration interface on the configuration master server can then be used to, for example, identify “hostname” to the server as a system to receive an OS distribution. UniConf on the server will in turn send a message (UniConf key/value) to “hostname” to instruct
system 102 to seek the OS distribution upon a boot of that system. A UniConf key/value message can also indicate that this boot should occur immediately, if desired. -
System 102, when rebooted, then reloads its UniConf tree of key/values which instructssystem 102 with the location of the network drive with which the local hard drive is to rsync (or to network mount that network drive if there is no hard drive). Following these operations,system 102 becomes a network-configured system with the desiredOS distribution 308 and may be initiated as previously described. -
Configuration application 306 can be loaded intosystem 102 by network booting. Base OS 304 (i.e. the kernel) and then theconfiguration application 306 may be loaded from a boot disk or a boot ROM (which may form part of a network I/F device 208). If thesystem 102 has a hard drive it may be automatically detected and used byconfiguration application 306. Ifsystem 102 does not have a local hard drive, thenconfiguration application 306 may be configured to use a network file system (NFS) identified by the base OS instead and thesystem 102 can still be fully functional. The identified OS distribution is then obtained by theconfiguration application 306. - In addition to configuring an operating system (OS distribution308) for each
system 102,configuration application 306 facilitates a templated user file system so that each individual user can have configuration files automatically generated for particular users application. The user applications are typically installed on network system-wide basis (i.e. are available to user systems such assystem 102 from a server). Configuration files for each user application can be templated and stored in a template directory from which they can be automatically copied or customized and copied, as necessary, to a particular user's directory. - A template requiring customization to identify a particular user may be run through a filter to replace user-specific parts with the correct information before being installed for the particular user. Template files not requiring user-specific part replacement may be simply installed into a user's home directory which may be a mount over NFS or a local drive relative to
system 102. - By installing appropriate templates at each login, the user's environment is always fully configured. FIG. 6 illustrates a flowchart of operations S600 for a user login in accordance with the invention.
- Any user configuration template file that requires user customization is preprocessed to generate a user
configuration template file 312. At S602, processing may be performed using standard regular expression substitution, for example, have OS substitution editor utility “sed” replace %%%%USER%%%% with the current username, etc. At S604, each user config template file 312 (generated by preprocessing or not) is compared with its corresponding user config template file stored in the user's personal template directory on the configuration master server. Because file comparison operations perform relatively slowly for a login, datestamps may be compared, working under the assumption that if the modification time is exactly the same it is most likely the exact same file. At S606, S608, if a particular userconfig template file 312 j does not exist in the user's personal template directory, the new file is copied to the user's personal template directory and preferably to the user's home directory atsystem 102. The datestamp is matched with that of the original template (S608). Otherwise, at S610, if the file is the same as the one in the template directory, nothing happens and operations return to S604. Otherwise, at S612, if the file is different from the one in the template directory, a file merge is performed to merge preferences selected by the user with new configuration information added by and administrative user. Such a file merge may be performed using a three-way difference utility, such as diff3 known to persons of ordinary skill in the art. - The template operations can be enhanced by keeping a copy of the installed templates locally in a user's home directory, where possible. By doing three-way differences between the user's local version, the templated version, and a previous template version stored remotely, updates may be automatically performed without removing a user's customization. The templates stored in the user's directory are then updated with the new global template version so that the merge is not done repeatedly.
- The templates do not necessarily need to be installed over a user's settings. Instead, the user can selective choose which configurations to update and/or override in order to gain any updates and to fix anything that has gone wrong. This can be accomplished by separating the template files into categories. Each template directory contains files for a certain user application grouping. For example, each application can have a separate sub directory in the overall template directory. An exemplary template directory structure is illustrated in FIG. 7.
- A template setup mechanism in
configuration application 306 may comprise a simple shell script that performs a for loop for every folder and subfolder of the template directories, running each “go” script located therein. Each go script can then be customized to do any extra configuration needed as well as running the main template program which does the procedure outlined earlier on the template directory given the destination directory/name. Optionally, the setup shell may be adapted with a parameter indicating a specific segment of the directories to setup or a flag to force an override, for example. - By having network boot images that load
configuration application 306 for configuringOS distribution 308 and user files such asapplications 310 andconfiguration templates 312,system 102 can be installed and set up with minimal input from the administrator and none from the end user. However, by providing an end user with templates that may be modified and merged, user customizations may be maintained. Remote storage ofOS distribution 306 and customizations (user configuration templates 312 etc.) permits a particular end user to login at anysystem 102 connected to the configuration master server and have the user's customizations automatically configuresystem 102. - It will be appreciated that variations of some elements are possible to adapt the invention for specific conditions or functions. The concepts of the present invention can be further extended to a variety of other applications that are clearly within the scope of this invention. Having thus described the present invention with respect to one or more embodiments as implemented, it will be apparent to those skilled in the art that many modifications and enhancements are possible to the present invention without departing from the basic concepts as described in the preferred embodiment of the present invention. Therefore, what is intended to be protected by way of letters patent should be limited only by the scope of the following claims.
Claims (59)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/417,153 US20030221094A1 (en) | 2002-04-17 | 2003-04-17 | Method and system for configuring a computer |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US37279702P | 2002-04-17 | 2002-04-17 | |
US10/417,153 US20030221094A1 (en) | 2002-04-17 | 2003-04-17 | Method and system for configuring a computer |
Publications (1)
Publication Number | Publication Date |
---|---|
US20030221094A1 true US20030221094A1 (en) | 2003-11-27 |
Family
ID=29553431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/417,153 Abandoned US20030221094A1 (en) | 2002-04-17 | 2003-04-17 | Method and system for configuring a computer |
Country Status (1)
Country | Link |
---|---|
US (1) | US20030221094A1 (en) |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040068523A1 (en) * | 2002-10-07 | 2004-04-08 | Keith Robert Olan | Method and system for full asynchronous master-to-master file synchronization |
US20060136708A1 (en) * | 2004-12-20 | 2006-06-22 | Hassan Hajji | Information processing system, program product, and information processing method |
US20060250982A1 (en) * | 2005-05-05 | 2006-11-09 | Harrow Products Llc | Methods and systems for discovering and configuring network devices |
US20070156383A1 (en) * | 2005-12-30 | 2007-07-05 | Ingo Zenz | Calculated values in system configuration |
US20070156432A1 (en) * | 2005-12-30 | 2007-07-05 | Thomas Mueller | Method and system using parameterized configurations |
US20070157185A1 (en) * | 2005-12-30 | 2007-07-05 | Semerdzhiev Krasimir P | System and method for deployable templates |
US20070157010A1 (en) * | 2005-12-30 | 2007-07-05 | Ingo Zenz | Configuration templates for different use cases for a system |
US20070156715A1 (en) * | 2005-12-30 | 2007-07-05 | Thomas Mueller | Tagged property files for system configurations |
US20070156389A1 (en) * | 2005-12-30 | 2007-07-05 | Frank Kilian | Dynamic adaptation of a configuration to a system environment |
US20070156431A1 (en) * | 2005-12-30 | 2007-07-05 | Semerdzhiev Krasimir P | System and method for filtering components |
US20070156641A1 (en) * | 2005-12-30 | 2007-07-05 | Thomas Mueller | System and method to provide system independent configuration references |
US20070156717A1 (en) * | 2005-12-30 | 2007-07-05 | Ingo Zenz | Meta attributes of system configuration elements |
US20070157172A1 (en) * | 2005-12-30 | 2007-07-05 | Ingo Zenz | Template integration |
US20070162892A1 (en) * | 2005-12-30 | 2007-07-12 | Ingo Zenz | Template-based configuration architecture |
WO2007076945A1 (en) * | 2005-12-30 | 2007-07-12 | Sap Ag | Virtualized and adaptive configuration of a system |
US20070168965A1 (en) * | 2005-12-30 | 2007-07-19 | Ingo Zenz | Configuration inheritance in system configuration |
US20070165937A1 (en) * | 2005-12-30 | 2007-07-19 | Markov Mladen L | System and method for dynamic VM settings |
US20070257715A1 (en) * | 2005-12-30 | 2007-11-08 | Semerdzhiev Krasimir P | System and method for abstract configuration |
US20070288893A1 (en) * | 2006-06-08 | 2007-12-13 | Microsoft Corporation | Extending configuration sections in configuration |
US20080114814A1 (en) * | 2006-11-14 | 2008-05-15 | Microsoft Corporation | Managing user customizations of pre-provisioned contexts |
US20080155338A1 (en) * | 2006-10-03 | 2008-06-26 | Altiris, Inc. | Software testing framework for multiple operating system, hardware, and software configurations |
US20080320472A1 (en) * | 2007-06-20 | 2008-12-25 | James Laska | Methods and systems for dynamically generating installation configuration files for software |
US20080320473A1 (en) * | 2007-06-21 | 2008-12-25 | James Laska | Methods and systems for dynamically generating installation configuration files for software |
US20090007152A1 (en) * | 2007-06-29 | 2009-01-01 | Microsoft Corporation | Management of external hardware appliances in a distributed operating system |
US20090193409A1 (en) * | 2008-01-24 | 2009-07-30 | Microsoft Corporation | Per User Updates |
US20090249051A1 (en) * | 2008-03-31 | 2009-10-01 | Tengaio Lance | Systems and methods for managing user configuration settings |
US7650435B2 (en) | 2004-10-22 | 2010-01-19 | International Business Machines Corporation | Apparatus and method to install a component in an information storage and retrieval system |
US20100050169A1 (en) * | 2008-08-21 | 2010-02-25 | Dehaan Michael Paul | Methods and systems for providing remote software provisioning to machines |
EP1724682B1 (en) * | 2005-05-19 | 2010-12-29 | Novell, Inc. | System for Creating a Customized Software Installation On Demand |
US8095562B2 (en) * | 2004-07-07 | 2012-01-10 | Sap Aktiengesellshaft | Configuring computer systems with business configuration information |
WO2012040606A2 (en) | 2010-09-23 | 2012-03-29 | Intel Corporation | Cluster computing - nic based os provision |
US8266616B1 (en) * | 2006-05-11 | 2012-09-11 | Hewlett-Packard Development Company, L.P. | Computer system provisioning using templates |
TWI423132B (en) * | 2004-12-17 | 2014-01-11 | Microsoft Corp | Extensible file system |
GB2508892A (en) * | 2012-12-14 | 2014-06-18 | Ibm | Updating a trusted device by booting update software and downloading the update over a network |
US8838750B2 (en) | 2005-12-30 | 2014-09-16 | Sap Ag | System and method for system information centralization |
US20150149756A1 (en) * | 2013-11-28 | 2015-05-28 | Inventec (Pudong) Technology Corporation | System and method for setting up a bootable storage device using image |
US20150229723A1 (en) * | 2014-02-09 | 2015-08-13 | OpenForest BV | Method for Personalization and Utilization of a Series of Connected Devices |
US9256442B2 (en) | 2014-03-03 | 2016-02-09 | International Business Machines Corporation | Network updatable user trusted device |
US20160092244A1 (en) * | 2014-09-25 | 2016-03-31 | Alcatel-Lucent Usa, Inc. | Configuration grading and prioritization during reboot |
CN106095417A (en) * | 2016-05-31 | 2016-11-09 | 广东欧珀移动通信有限公司 | A kind of prospect Application Program Interface refresh synchronization method and system |
CN108037961A (en) * | 2017-12-07 | 2018-05-15 | 北京锐安科技有限公司 | A kind of application program collocation method, device, server and storage medium |
CN109032686A (en) * | 2018-06-07 | 2018-12-18 | 北京小米移动软件有限公司 | Data processing method and device |
US10445084B1 (en) * | 2005-12-30 | 2019-10-15 | United Services Automobile Association (Usaa) | Method and system for installing software |
US10505805B1 (en) * | 2017-06-26 | 2019-12-10 | Amazon Technologies, Inc. | Computing resources checkpoint restoration |
CN115587071A (en) * | 2022-12-12 | 2023-01-10 | 南京芯驰半导体科技有限公司 | Multi-core heterogeneous SoC-based vehicle-mounted system data storage system and method |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5165018A (en) * | 1987-01-05 | 1992-11-17 | Motorola, Inc. | Self-configuration of nodes in a distributed message-based operating system |
US6044465A (en) * | 1997-07-07 | 2000-03-28 | International Business Machines Corporation | User profile storage on and retrieval from a non-native server domain for use in a client running a native operating system |
US6202091B1 (en) * | 1997-12-08 | 2001-03-13 | Nortel Networks Limited | Process and apparatus for initializing a computer from power up |
US20010032235A1 (en) * | 1999-12-01 | 2001-10-18 | Peter Madany | Low cost, stateless, full-featured information appliance |
US6334149B1 (en) * | 1998-12-22 | 2001-12-25 | International Business Machines Corporation | Generic operating system usage in a remote initial program load environment |
US6345294B1 (en) * | 1999-04-19 | 2002-02-05 | Cisco Technology, Inc. | Methods and apparatus for remote configuration of an appliance on a network |
US6466972B1 (en) * | 1999-03-31 | 2002-10-15 | International Business Machines Corporation | Server based configuration of network computers via machine classes |
US6934853B2 (en) * | 2001-01-18 | 2005-08-23 | International Business Machines Corporation | Method, system and program for sharing the ability to set configuration parameters in a network environment |
US6938250B2 (en) * | 2002-06-12 | 2005-08-30 | Microsoft Corporation | Image-based software installation |
US6993642B2 (en) * | 2001-07-24 | 2006-01-31 | Microsoft Corporation | Method and system for creating and employing an operating system having selected functionality |
US7028305B2 (en) * | 2001-05-16 | 2006-04-11 | Softricity, Inc. | Operating system abstraction and protection layer |
US7155701B1 (en) * | 1997-05-30 | 2006-12-26 | Oracle Corporation | System for dynamically constructing an executable computer program |
-
2003
- 2003-04-17 US US10/417,153 patent/US20030221094A1/en not_active Abandoned
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5165018A (en) * | 1987-01-05 | 1992-11-17 | Motorola, Inc. | Self-configuration of nodes in a distributed message-based operating system |
US7155701B1 (en) * | 1997-05-30 | 2006-12-26 | Oracle Corporation | System for dynamically constructing an executable computer program |
US6044465A (en) * | 1997-07-07 | 2000-03-28 | International Business Machines Corporation | User profile storage on and retrieval from a non-native server domain for use in a client running a native operating system |
US6202091B1 (en) * | 1997-12-08 | 2001-03-13 | Nortel Networks Limited | Process and apparatus for initializing a computer from power up |
US6334149B1 (en) * | 1998-12-22 | 2001-12-25 | International Business Machines Corporation | Generic operating system usage in a remote initial program load environment |
US6466972B1 (en) * | 1999-03-31 | 2002-10-15 | International Business Machines Corporation | Server based configuration of network computers via machine classes |
US6345294B1 (en) * | 1999-04-19 | 2002-02-05 | Cisco Technology, Inc. | Methods and apparatus for remote configuration of an appliance on a network |
US20010032235A1 (en) * | 1999-12-01 | 2001-10-18 | Peter Madany | Low cost, stateless, full-featured information appliance |
US6934853B2 (en) * | 2001-01-18 | 2005-08-23 | International Business Machines Corporation | Method, system and program for sharing the ability to set configuration parameters in a network environment |
US7028305B2 (en) * | 2001-05-16 | 2006-04-11 | Softricity, Inc. | Operating system abstraction and protection layer |
US6993642B2 (en) * | 2001-07-24 | 2006-01-31 | Microsoft Corporation | Method and system for creating and employing an operating system having selected functionality |
US6938250B2 (en) * | 2002-06-12 | 2005-08-30 | Microsoft Corporation | Image-based software installation |
Cited By (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040068523A1 (en) * | 2002-10-07 | 2004-04-08 | Keith Robert Olan | Method and system for full asynchronous master-to-master file synchronization |
US8095563B2 (en) * | 2004-07-07 | 2012-01-10 | Sap Aktiengesellschaft | Configuring computer systems with business configuration information |
US8095564B2 (en) * | 2004-07-07 | 2012-01-10 | Sap Aktiengesellschaft | Configuring computer systems with business configuration information |
US8095562B2 (en) * | 2004-07-07 | 2012-01-10 | Sap Aktiengesellshaft | Configuring computer systems with business configuration information |
US7650435B2 (en) | 2004-10-22 | 2010-01-19 | International Business Machines Corporation | Apparatus and method to install a component in an information storage and retrieval system |
TWI423132B (en) * | 2004-12-17 | 2014-01-11 | Microsoft Corp | Extensible file system |
US20060136708A1 (en) * | 2004-12-20 | 2006-06-22 | Hassan Hajji | Information processing system, program product, and information processing method |
US7937575B2 (en) | 2004-12-20 | 2011-05-03 | Lenovo (Singapore) Pte. Ltd. | Information processing system, program product, and information processing method |
US20060250982A1 (en) * | 2005-05-05 | 2006-11-09 | Harrow Products Llc | Methods and systems for discovering and configuring network devices |
EP1724682B1 (en) * | 2005-05-19 | 2010-12-29 | Novell, Inc. | System for Creating a Customized Software Installation On Demand |
US10445084B1 (en) * | 2005-12-30 | 2019-10-15 | United Services Automobile Association (Usaa) | Method and system for installing software |
US7506145B2 (en) | 2005-12-30 | 2009-03-17 | Sap Ag | Calculated values in system configuration |
US20070157172A1 (en) * | 2005-12-30 | 2007-07-05 | Ingo Zenz | Template integration |
US20070162892A1 (en) * | 2005-12-30 | 2007-07-12 | Ingo Zenz | Template-based configuration architecture |
WO2007076944A1 (en) * | 2005-12-30 | 2007-07-12 | Sap Ag | Configuration templates for different use cases for a system |
WO2007076945A1 (en) * | 2005-12-30 | 2007-07-12 | Sap Ag | Virtualized and adaptive configuration of a system |
US20070168965A1 (en) * | 2005-12-30 | 2007-07-19 | Ingo Zenz | Configuration inheritance in system configuration |
US20070165937A1 (en) * | 2005-12-30 | 2007-07-19 | Markov Mladen L | System and method for dynamic VM settings |
US20070257715A1 (en) * | 2005-12-30 | 2007-11-08 | Semerdzhiev Krasimir P | System and method for abstract configuration |
US20070156641A1 (en) * | 2005-12-30 | 2007-07-05 | Thomas Mueller | System and method to provide system independent configuration references |
US20070156431A1 (en) * | 2005-12-30 | 2007-07-05 | Semerdzhiev Krasimir P | System and method for filtering components |
US9038023B2 (en) | 2005-12-30 | 2015-05-19 | Sap Se | Template-based configuration architecture |
US8849894B2 (en) | 2005-12-30 | 2014-09-30 | Sap Ag | Method and system using parameterized configurations |
US8843918B2 (en) | 2005-12-30 | 2014-09-23 | Sap Ag | System and method for deployable templates |
US8838750B2 (en) | 2005-12-30 | 2014-09-16 | Sap Ag | System and method for system information centralization |
US20070156717A1 (en) * | 2005-12-30 | 2007-07-05 | Ingo Zenz | Meta attributes of system configuration elements |
US20070156389A1 (en) * | 2005-12-30 | 2007-07-05 | Frank Kilian | Dynamic adaptation of a configuration to a system environment |
US8271769B2 (en) | 2005-12-30 | 2012-09-18 | Sap Ag | Dynamic adaptation of a configuration to a system environment |
US20070156715A1 (en) * | 2005-12-30 | 2007-07-05 | Thomas Mueller | Tagged property files for system configurations |
US20070156383A1 (en) * | 2005-12-30 | 2007-07-05 | Ingo Zenz | Calculated values in system configuration |
US7694117B2 (en) | 2005-12-30 | 2010-04-06 | Sap Ag | Virtualized and adaptive configuration of a system |
US7779389B2 (en) | 2005-12-30 | 2010-08-17 | Sap Ag | System and method for dynamic VM settings |
US7793087B2 (en) | 2005-12-30 | 2010-09-07 | Sap Ag | Configuration templates for different use cases for a system |
US7797522B2 (en) | 2005-12-30 | 2010-09-14 | Sap Ag | Meta attributes of system configuration elements |
US20070157010A1 (en) * | 2005-12-30 | 2007-07-05 | Ingo Zenz | Configuration templates for different use cases for a system |
US7870538B2 (en) | 2005-12-30 | 2011-01-11 | Sap Ag | Configuration inheritance in system configuration |
US20070157185A1 (en) * | 2005-12-30 | 2007-07-05 | Semerdzhiev Krasimir P | System and method for deployable templates |
US7954087B2 (en) | 2005-12-30 | 2011-05-31 | Sap Ag | Template integration |
US8201189B2 (en) * | 2005-12-30 | 2012-06-12 | Sap Ag | System and method for filtering components |
US20070156432A1 (en) * | 2005-12-30 | 2007-07-05 | Thomas Mueller | Method and system using parameterized configurations |
US8266616B1 (en) * | 2006-05-11 | 2012-09-11 | Hewlett-Packard Development Company, L.P. | Computer system provisioning using templates |
US20070288893A1 (en) * | 2006-06-08 | 2007-12-13 | Microsoft Corporation | Extending configuration sections in configuration |
US20080155338A1 (en) * | 2006-10-03 | 2008-06-26 | Altiris, Inc. | Software testing framework for multiple operating system, hardware, and software configurations |
US8037360B2 (en) * | 2006-10-03 | 2011-10-11 | Symantec Corporation | Software testing framework for multiple operating system, hardware, and software configurations |
US8266259B2 (en) * | 2006-11-14 | 2012-09-11 | Microsoft Corporation | Managing user customizations of pre-provisioned contexts |
US20080114814A1 (en) * | 2006-11-14 | 2008-05-15 | Microsoft Corporation | Managing user customizations of pre-provisioned contexts |
US8561058B2 (en) * | 2007-06-20 | 2013-10-15 | Red Hat, Inc. | Methods and systems for dynamically generating installation configuration files for software |
US20080320472A1 (en) * | 2007-06-20 | 2008-12-25 | James Laska | Methods and systems for dynamically generating installation configuration files for software |
US8464247B2 (en) * | 2007-06-21 | 2013-06-11 | Red Hat, Inc. | Methods and systems for dynamically generating installation configuration files for software |
US20080320473A1 (en) * | 2007-06-21 | 2008-12-25 | James Laska | Methods and systems for dynamically generating installation configuration files for software |
US20090007152A1 (en) * | 2007-06-29 | 2009-01-01 | Microsoft Corporation | Management of external hardware appliances in a distributed operating system |
US8060891B2 (en) | 2007-06-29 | 2011-11-15 | Microsoft Corporation | Management of external hardware appliances in a distributed operating system |
US20090193409A1 (en) * | 2008-01-24 | 2009-07-30 | Microsoft Corporation | Per User Updates |
US7971049B2 (en) * | 2008-03-31 | 2011-06-28 | Symantec Corporation | Systems and methods for managing user configuration settings |
US20090249051A1 (en) * | 2008-03-31 | 2009-10-01 | Tengaio Lance | Systems and methods for managing user configuration settings |
US20100050169A1 (en) * | 2008-08-21 | 2010-02-25 | Dehaan Michael Paul | Methods and systems for providing remote software provisioning to machines |
US8930512B2 (en) * | 2008-08-21 | 2015-01-06 | Red Hat, Inc. | Providing remote software provisioning to machines |
EP2454659A4 (en) * | 2010-09-23 | 2013-08-07 | Intel Corp | Cluster computing - nic based os provision |
WO2012040606A2 (en) | 2010-09-23 | 2012-03-29 | Intel Corporation | Cluster computing - nic based os provision |
US8688812B2 (en) | 2010-09-23 | 2014-04-01 | Intel Corporation | Cluster computing—NIC based OS provision |
EP2454659A2 (en) * | 2010-09-23 | 2012-05-23 | Intel Corporation | Cluster computing - nic based os provision |
AU2011305211B2 (en) * | 2010-09-23 | 2014-07-03 | Intel Corporation | Cluster computing - NIC based OS provision |
GB2508892A (en) * | 2012-12-14 | 2014-06-18 | Ibm | Updating a trusted device by booting update software and downloading the update over a network |
US20150149756A1 (en) * | 2013-11-28 | 2015-05-28 | Inventec (Pudong) Technology Corporation | System and method for setting up a bootable storage device using image |
US20150229723A1 (en) * | 2014-02-09 | 2015-08-13 | OpenForest BV | Method for Personalization and Utilization of a Series of Connected Devices |
US9256442B2 (en) | 2014-03-03 | 2016-02-09 | International Business Machines Corporation | Network updatable user trusted device |
US20160092244A1 (en) * | 2014-09-25 | 2016-03-31 | Alcatel-Lucent Usa, Inc. | Configuration grading and prioritization during reboot |
US9535716B2 (en) * | 2014-09-25 | 2017-01-03 | Alcatel-Lucent Usa Inc. | Configuration grading and prioritization during reboot |
US20180365032A1 (en) * | 2016-05-31 | 2018-12-20 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method for Interface Refresh Synchronization, Terminal Device, and Non-Transitory Computer-Readable Storage Medium |
WO2017206893A1 (en) * | 2016-05-31 | 2017-12-07 | 广东欧珀移动通信有限公司 | Interface refresh synchronization method and apparatus, terminal, and storage medium |
EP3407186A4 (en) * | 2016-05-31 | 2019-03-20 | Guangdong OPPO Mobile Telecommunications Corp., Ltd. | Interface refresh synchronization method and apparatus, terminal, and storage medium |
CN106095417A (en) * | 2016-05-31 | 2016-11-09 | 广东欧珀移动通信有限公司 | A kind of prospect Application Program Interface refresh synchronization method and system |
US10768947B2 (en) | 2016-05-31 | 2020-09-08 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method for interface refresh synchronization,terminal device, and non-transitory computer-readable storage medium |
US10810019B2 (en) * | 2016-05-31 | 2020-10-20 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method for interface refresh synchronization, terminal device, and non-transitory computer-readable storage medium |
US10505805B1 (en) * | 2017-06-26 | 2019-12-10 | Amazon Technologies, Inc. | Computing resources checkpoint restoration |
CN108037961A (en) * | 2017-12-07 | 2018-05-15 | 北京锐安科技有限公司 | A kind of application program collocation method, device, server and storage medium |
CN109032686A (en) * | 2018-06-07 | 2018-12-18 | 北京小米移动软件有限公司 | Data processing method and device |
CN115587071A (en) * | 2022-12-12 | 2023-01-10 | 南京芯驰半导体科技有限公司 | Multi-core heterogeneous SoC-based vehicle-mounted system data storage system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030221094A1 (en) | Method and system for configuring a computer | |
US10609112B2 (en) | Method, server and system for converging desktop application and web application | |
US8606886B2 (en) | System for conversion between physical machines, virtual machines and machine images | |
US8635611B2 (en) | Creating virtual applications | |
US7124409B2 (en) | Automatic software installation on heterogeneous networked computer systems | |
US7024471B2 (en) | Mechanism to dynamically update a windows system with user specific application enablement support from a heterogeneous server environment | |
US5742829A (en) | Automatic software installation on heterogeneous networked client computer systems | |
US7774762B2 (en) | System including run-time software to enable a software application to execute on an incompatible computer platform | |
US6202207B1 (en) | Method and a mechanism for synchronized updating of interoperating software | |
US6408434B1 (en) | System and method for using a substitute directory to automatically install an update program | |
US20080222160A1 (en) | Method and system for providing a program for execution without requiring installation | |
US20040034850A1 (en) | Servicing a component-based software product throughout the software product lifecycle | |
US20120278726A1 (en) | Unified secure virtual machine player and remote desktop client | |
US7877735B2 (en) | Application cloning | |
EP2019358A1 (en) | A method and a system for the creation and deployment of a virtual machine appliance on virtualised servers | |
JP2001508575A (en) | Software Update Manager | |
JPH10177473A (en) | Computer program installation method and system therefor | |
US20070240150A1 (en) | Simplifying installation of a suite of software products | |
US20060129616A1 (en) | System and method for synchronizing computer files between a local computer and a remote server | |
US20040221146A1 (en) | Build time dynamic installation of drivers on cloned systems | |
US11144292B2 (en) | Packaging support system and packaging support method | |
US20030233645A1 (en) | Application imaging infrastructure | |
US8161383B2 (en) | Information processing apparatus and information processing method | |
TW200847018A (en) | Side-by-side application manifests for single-purpose applications | |
US20060167925A1 (en) | System and method for providing system objects to a database |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ONTARIO INC, CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NET INTEGRATION TECHNOLOGIES, INC;REEL/FRAME:020599/0319 Effective date: 20080214 Owner name: ONTARIO INC,CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NET INTEGRATION TECHNOLOGIES, INC;REEL/FRAME:020599/0319 Effective date: 20080214 |
|
AS | Assignment |
Owner name: 2162784 ONTARIO INC., CANADA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE PREVIOUSLY RECORDED ON REEL 020599 FRAME 0319. ASSIGNOR(S) HEREBY CONFIRMS THE CORRECT ASSIGNEE IS "2162784 ONTARIO INC".;ASSIGNOR:NET INTEGRATION TECHNOLOGIES INC.;REEL/FRAME:020762/0506 Effective date: 20080214 Owner name: 2162784 ONTARIO INC.,CANADA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE PREVIOUSLY RECORDED ON REEL 020599 FRAME 0319. ASSIGNOR(S) HEREBY CONFIRMS THE CORRECT ASSIGNEE IS "2162784 ONTARIO INC";ASSIGNOR:NET INTEGRATION TECHNOLOGIES INC.;REEL/FRAME:020762/0506 Effective date: 20080214 |
|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:2162784 ONTARIO INC;REEL/FRAME:020876/0949 Effective date: 20080501 Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION,NEW YO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:2162784 ONTARIO INC;REEL/FRAME:020876/0949 Effective date: 20080501 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |